Don't Get Caught in the Middle: The Rise of AiTM Phishing
- echoudhury77

- Aug 19
- 3 min read

For years, we've been told that Multi-Factor Authentication (MFA) is the golden ticket to cybersecurity. And for a long time, it was. Adding a second layer of security, like a code from an authenticator app or a text message, was a powerful way to stop credential theft. But cybercriminals, as they always do, have found a way around it.
Enter Adversary-in-the-Middle (AiTM) phishing, a new and dangerously effective type of attack that bypasses traditional MFA and puts your data at serious risk.
What is AiTM, and How Does It Work?
AiTM is a sophisticated twist on the classic "man-in-the-middle" (MitM) attack. While a MitM attack broadly involves an attacker intercepting communication between two parties, an AiTM attack is specifically designed to hijack the authentication process.
Think of it this way: In a traditional phishing attack, a criminal creates a fake login page to steal your username and password. With an AiTM attack, they go one step further. The attacker acts as a real-time proxy between you and the legitimate website you're trying to access.
Here's the typical attack flow:
The Phishing Lure: You receive an email that looks legitimate—perhaps a notification from a trusted service like Microsoft 365 or a corporate portal. The email contains a link that, while appearing normal, actually points to the attacker's proxy server.
The Proxy in the Middle: When you click the link, you are redirected to the attacker's server, which is set up to look exactly like the real login page. Behind the scenes, this server is communicating with the actual website. It's relaying the login page to you, and when you enter your credentials, it forwards them to the real site.
Credential and Session Theft: As you log in and complete your MFA prompt (entering a code or approving a push notification), the attacker's proxy captures not only your username and password but also the real-time MFA token and, most critically, your session cookie.
Bypassing MFA: The attacker now has the session cookie—a small piece of data that proves your identity to the website. They can use this cookie to authenticate themselves as you, gaining access to your account without ever needing to go through the MFA process again.
This is what makes AiTM attacks so insidious. Because the attacker is using your stolen session to log in, security systems that rely on MFA prompts are completely bypassed. To the system, the attacker's login looks like a legitimate session takeover.
How to Protect Yourself and Your Organization
Defending against AiTM attacks requires a multi-layered approach that goes beyond traditional MFA.
Phishing-Resistant MFA: Not all MFA is created equal. While SMS and authenticator apps are vulnerable to AiTM, hardware-backed methods like FIDO2 security keys and Windows Hello for Business are highly resistant. These methods use cryptographic authentication, which makes it impossible for an attacker to steal and reuse the session token.
Implement Conditional Access Policies: Organizations can use conditional access policies to add an extra layer of security. These policies can require a device to be compliant (e.g., enrolled in a mobile device management system) or only allow access from trusted network locations. This can help flag and block anomalous login attempts from an attacker's location.
Employee Training and Awareness: While the technical defenses are crucial, human vigilance remains a key part of the solution. Train employees to be suspicious of any login page that seems even slightly out of place. Encourage them to verify URLs and to be cautious of emails requesting immediate action.
Monitor for Anomalous Behavior: Security teams should monitor for suspicious login patterns, such as "impossible travel" (a user logging in from two geographically distant locations in a short period of time), logins from unfamiliar IP addresses, or the creation of new inbox rules (a common tactic for attackers to hide their activity).
AiTM attacks are a clear sign that the cybersecurity landscape is constantly evolving. As attackers find new ways to circumvent our defenses, we must adapt our strategies. By moving toward phishing-resistant MFA and implementing smarter access controls, we can build a more resilient defense against these sophisticated threats.




Comments